BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-352-01.json | Broken Link |
| https://www.cve.org/CVERecord?id=CVE-2025-62001 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) BullWall Ransomware Containment supports configurable file and directory exclusions such as '$RECYCLE.BIN' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which remove hardcoded exclusion behavior and exposes exclusion handling as configurable settings. |
14 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) BullWall Ransomware Containment supports configurable file and directory exclusions such as '$recycle.bin' to balance monitoring scope and performance. Certain exclusion patterns could allow an authenticated attacker with file-write permissions to rename directories in a way that avoids monitoring. Fixed in 4.6.1.14 and 5.0.0.42, which removes hardcoded exclusion behavior and exposes exclusion handling as configurable settings. |
12 Jan 2026, 17:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Bullwall ransomware Containment
Bullwall |
|
| CPE | cpe:2.3:a:bullwall:ransomware_containment:4.6.0.7:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.6:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.1.4:*:*:*:*:*:*:* cpe:2.3:a:bullwall:ransomware_containment:4.6.0.0:*:*:*:*:*:*:* |
|
| References | () https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/VA-25-352-01.json - Broken Link | |
| References | () https://www.cve.org/CVERecord?id=CVE-2025-62001 - Third Party Advisory |
18 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-18 21:15
Updated : 2026-01-15 20:16
NVD link : CVE-2025-62001
Mitre link : CVE-2025-62001
CVE.ORG link : CVE-2025-62001
JSON object : View
Products Affected
bullwall
- ransomware_containment
CWE
CWE-420
Unprotected Alternate Channel
